Designing and Implementing Security Policies

Pluralsight
Course Summary
This course will focus on factors feeding into the creation of organizational security policies. You'll develop an understanding of proper functions, and how to design your own security policies within business and regulatory requirements.
-
+
Course Description
Without IT security policies, organizations have no framework that defines the proper and safe use of IT systems and data. In this course, Designing and Implementing Security Policies, you'll be exposed to security standards bodies, and how to create security policies based on recommendations from these standards bodies. First, you'll learn examples of implementing security settings based on security policy documentation. Next, you'll learn how to determine the finer details of security policies, including the use of specific security controls and the consequences of policy non-compliance. Finally, you'll gain insight on how technical controls can be interpreted and then implemented for policy compliance. By the end of this course, you'll have an understanding of how policy documents are laid out, and how to design and implement security policies within business and regulatory requirements.
-
+
Course Syllabus
Course Overview- 1m 46s
—Course Overview 1m 46sIdentifying Security Standards and Bodies- 29m 43s
—Module Overview, Cyber Law, and Cyber Insurance 5m 20s
—Cyber Insurance Offerings 1m 17s
—International Organization for Standardization (ISO) 4m 42s
—Payment Card Industry Data Security Standard (PCI DSS) 2m 39s
—Review PCI DSS Security Requirements 2m 48s
—PCI DSS Self-Assessment Questionnaire 3m 10s
—Implement PCI DSS Security Requirements 1m 18s
—Health Insurance Portability and Accountability Act (HIPAA) 1m 33s
—Review HIPAA Technical Security Requirements 2m 21s
—Other Privacy and Security Standards 3m 25s
—Module Summary 1m 5sDesigning Security Policies- 1h 2mImplementing Security Policies- 32m 45s